Skip to main content
TrustRadius
IBM Security Guardium

IBM Security Guardium

Overview

What is IBM Security Guardium?

IBM Security Guardium is IBM's data security posture management solution, that aims to offer organizations comprehensive visibility, actionable insights and real-time controls to help users comply with regulations, preserve privacy and secure your sensitive data — no matter where it…

Read more
Recent Reviews

Guard

10 out of 10
February 19, 2024
We are using as db monitoring tool. Analyzing critical table manipulations, table exporting, db exporting etc.
We also thinking and …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Product Details

What is IBM Security Guardium?

Whether focusing on data use, protection, governance, or reporting, some businesses need a solution that supports a zero-trust approach to data security across its lifecycle on-premises or in the cloud. The IBM Security™ Guardium® portfolio protects sensitive and regulated data across fragmented environments. Here’s a peek at the products within the Guardium portfolio:

IBM Security Guardium Data Protection discovers and classifies sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data.

IBM Security Guardium Insights provides centralized data security across the hybrid multi-cloud. Adapt and scale with modern architecture, streamline compliance and audit processes, and share contextual risk insights across security teams to support zero trust.

IBM Security Guardium Data Security Posture Management (DSPM) helps discover cloud shadow data, analyze data flow between regions, and uncover vulnerabilities across cloud and SaaS applications

IBM Security Guardium Data Encryption (GDE) consists of a unified suite of products built on a common infrastructure. These scalable solutions provide data encryption, tokenization, data masking, and key management capabilities to help protect and control access to data across the hybrid multi-cloud environment.

IBM Security Discover and Classify provides integrated discovery and classification of structured and unstructured data across all environments. IBM Security Discover and Classify is part of the IBM Security Guardium suite of products.

IBM Security Guardium Key Lifecycle Manager centralizes, simplifies, and automates the encryption key management process to help protect encrypted data and simplify encryption key management. Guardium Key Lifecycle Manager helps customers meet regulations such as PCI DSS, Sarbanes-Oxley, and HIPAA by providing access control, key rotation, and other automated key lifecycle management processes.

IBM Security Guardium Vulnerability Assessment scans data infrastructures such as databases, data warehouses, and big data environments to detect vulnerabilities and suggests remedial actions. This vulnerability assessment tool identifies exposures such as missing patches, weak passwords, unauthorized changes, and misconfigured privileges.

IBM Data Risk Manager provides executives and their teams with a business-consumable data risk control center that helps to uncover, analyze, and visualize data-related business risks so they can take action to protect their business.


https://ibm.biz/Security_Guardium_product_page




IBM Security Guardium Features

  • Supported: Ability to monitor, receive & issue alerts in real-time
  • Supported: Data encryption, data masking & tokenization
  • Supported: Advanced data threat analytics
  • Supported: Centralized management of encryption keys
  • Supported: Ability to manage data risk across complex IT environments
  • Supported: Ability to discover & analyze both structured & unstructured data assets
  • Supported: Vulnerability assessments & recommendations
  • Supported: Ability to maintain a tamper-proof audit trail
  • Supported: Compliance quick starts & features around compliance monitoring
  • Supported: Out-of-the-box dashboards
  • Supported: Ability to integrate with SIEM solutions
  • Supported: Ability to block, mask & quarantine data access
  • Supported: Flexible deployment options & variety of connectors
  • Supported: Ability to detect dormant accounts or misconfigured entitlements
  • Supported: Out-of-the-box discovery & classification patterns
  • Supported: Heterogeneous integration with other security solutions

IBM Security Guardium Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

IBM Security Guardium is IBM's data security posture management solution, that aims to offer organizations comprehensive visibility, actionable insights and real-time controls to help users comply with regulations, preserve privacy and secure your sensitive data — no matter where it is stored.

BigID, AWS Security Hub, and Oracle Security Monitoring and Analytics are common alternatives for IBM Security Guardium.

Reviewers rate Support Rating highest, with a score of 9.5.

The most common users of IBM Security Guardium are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(73)

Attribute Ratings

Reviews

(1-21 of 21)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use Security Guardium key lifecycle management. We need to store keys safely and It provides store and manage keys. Also It provides centrally manage the key lifecycle process. It also supports other brand devices. We use Security Guardium data protection. We use it to take secure snapshots on storage volumes to protect against any cyber attack.
  • tool simplifies
  • centralized management
  • provide data security
  • gklm does not work after upgrade version,
  • glkm database user's password can not be changed
  • usable data protection
Data protection and Guardium key lifecycle management are useful tools. You can implement them easily. Other brand storages support Guardium key lifecycle management. After 8.6 firmware version, IBM storage family support Guardium data protection. You can take secure snapshot on volume. You can create policy for snapshot operations. It manage and runs automatically.
FURKAN GÖKCAN | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We provide consultancy services to provide customers with the most efficiency in every aspect of this product. In Turkey, we have a customer portfolio that includes 90% of the companies that are regulated in terms of database security. In customer environment, we personally deal with GUI and cli management of Guardium, which provides solutions to issues such as database logging and alarming.
  • Collecting Logs
  • Syslog and Mail alerts
  • Guardium ISO installation
  • Agent installation and uninstallation
  • We had big troubles with GIM certificate update
  • IBM Support Engineers
  • Guardium Self-Audit
It is an adequate product for many purposes. It has a very stable structure in terms of installation, policy and report layout, and database logging. It has a very smooth and simple process for patch upgrading. We can use correlation alarms very effectively. Inactive STAP and Inactive Managed Unit alerts are life saver in some cases. Also, buff usage monitor is a beautiful interface and the buffer of agents is crucial not to lose logs. But, Guardium is not logging tool activities. Also, not logging ".sql" scripts.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
IBM Security Guardium is a data protection platform that helps my organization to safeguard sensitive data like datawarehouses , realtime connections , vulnerability , data masking , big data , and alot of other features we use , data security in all sizes , also user friendly and fancy UI to have it all in one place.
  • Connection to Other IBM products Seemless ( Cloud PAK for data , integration and Other IBM Products and Dbs )
  • Vulnerability Assessment and Risk Management to comply with PCI and Governamental Data Authority
  • Real-time Data Activity Monitoring seeing all activities happeing in Organization
  • some of the sevices not already integrable in direct way perhaps if there is a store for it would be better
real-time monitoring activities across multiple databases, spotting abnormal access patterns or unauthorized attempts to reach sensitive data, like accessing BigData and datalakes . It alerts institutions, aiding in preventing breaches and ensuring compliance with laws like PCI DSS by offering detailed audit trails.
Brandon Lowry | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
IBM Guardium is used in our company to efficiently protect and manage the sensitive and confidential data we handle on a daily basis. One of the main ways we use IBM Guardium is to monitor and audit data access and usage activities across the organization. With this platform, we can track who accesses data, what actions are taken and when they occur. This provides complete visibility into data-related activities, allowing us to quickly detect and respond to any suspicious or unauthorized activity.
  • Provides complete monitoring of data access and usage activities.
  • Provides customizable security controls and policies that help us meet compliance and regulatory requirements.
  • Uses advanced algorithms and machine learning to detect abnormal behavior patterns.
  • Helps us protect sensitive and confidential data by controlling access.
  • Integrates easily with other security systems and tools.
  • Configuration and set-up can be complex and require some time and effort to implement correctly.
  • The cost of acquiring and maintaining IBM Guardium can be significant.
IBM Guardium is an ideal solution for the financial sector, providing data protection, regulatory compliance, insider threat detection and fraud prevention. Its comprehensive approach and advanced capabilities make it an essential tool for ensuring data security and integrity in financial institutions.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
IBM Security Guardium is used to detect internal threats in the organization, its detection process is very fast and it also looks for alternative solutions for threats. Sensitive data is often protected by minimizing threats. Provides alerts to any suspicious movement that is generated in the system and seeks to get rid of problems. It also serves to monitor and presents customizable dashboards. It's priced a little high for small businesses, but it's a price you can pay for full-featured software that's worth it.
  • Quickly detect hidden threats that try to enter our systems.
  • Find solutions for problems that directly affect our processes.
  • Protect data with good backup.
  • Provides detailed reports that help make future improvements.
  • Fast implementation but with little documentation.
  • Alert of very frequent threats with false positives.
  • Protect user information.
In summary, this tool in general has great potential, all the features that we have managed to test have been worth it, obtaining the expected results. It has the ability to protect all the internal data of your company. Implementing it is a wise choice there is no doubt about that, reporting, monitoring, automation, and threat protection, are the main functions that we use.
Score 5 out of 10
Vetted Review
Verified User
Incentivized
Everytime we need IBM international support, it gets a long time to be solved, in most times. It tooks a long time to underrstand, resolve and we stay with the bug or issue for a long time.<br>Brazil needs a local support in order to be faster.<br>We appreciate technician insights of guardium but,Guardium System has a lot os bugs;
  • A lot of security resources
  • Interface (somentimes can be good, or not)
  • audit details
  • Support
  • interface can be better
Everytime we have a bug on scenario, just verify our ticket history, i'll see that the tickets stay oppened for a long time.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use IBM Security Guardium for auditing and identifying preventive behavior. For us it is very important to identify and remedy access intrusions and also to identify vulnerabilities in our databases
  • Access Auditing
  • vulnerability analysis
  • Identification of behavior
  • Updates often bring bugs
IBM Security Guardium works very well at discovering vulnerabilities and storing logs. On the other hand, there is a lot of room for improvement in the communication between the agent and the server and also in the updates.
Meena Prasad | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
This software caught our attention because we noticed that it could provide us with good protection of our data; in our company, the flow of information is very active, and keeping our data vulnerable is not an option, but with IBM Security Guardium, we can manage analysis very well and protection of our data, it detects threats quickly, which allows us to have a lot of peace of mind and be sure of the functions that IBM Security Guardium offers us, since, in the 3 years that we have been using it, it has been beneficial and with notable results.
  • Speed in detecting threats.
  • Troubleshooting is fast, analytics are powerful.
  • It establishes good security parameters, and has precise functions to make decisions and solve problems quickly.
  • Although it is a relatively simple software to use, it requires a bit of knowledge, which a new user cannot do without consolidating some previous knowledge.
  • The technical support team is not ideal; although, on many occasions we have not needed their help, the times we have interacted it has left us wanting more.
It is a perfect system for companies with a high volume of data since it allows the data to be secure, the detection of threats is instantaneous and automatic, it does not require complicated procedures to configure it, it also adapts to internal needs and helps us to fix problems instantly. I am pleased to say that it is a system that I recommend for companies to stay away from threats and protect data in a very secure way.
Wiliam de Faria | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
As a result of the implementation of the General Data Protection Law LGPD and GDPR, we need to ensure that personal data are encrypted and monitored, in addition to allowing the process to discover these data and their vulnerabilities to guide the company, in addition to allowing the governance of these data on consumption times
  • compliance report
  • personal data discovery
  • data encryption
  • Monitor data access
  • risk assessment
  • integration with privacy management tools
  • application deployment on primese
  • integration with SAP
ensure the analysis of vulnerability and risk of personal data within the corporation and secure encryption of data in a fast and performative way, easy administration by administering cryptographic keys
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We have been using this tool: IBM Security Guardium for over a year now and it is doing an immense job of protecting our highly critical data by minimizing the security threats. It makes the data monitoring pretty easy as everything is automated and gives us a proper report on a daily basis.
  • Allows us to set various level of permissions for each user for the access of data.
  • Unusual activities are immediately flagged and an alert is sent.
  • Easy auditing as per the compliances.
  • The support is bit inefficient.
  • Looks a little bit clunky and navigation is hard.
  • Could impact your system performance.
IBM Security Guardium is very well suited for large organizations and provides an end to end Data Security. All the activities related to your critical data are continuously monitored and all suspicious ones are alerted in real-time. There are a lot of functionalities available in this like reporting, dashboards, and easy integration.
rajat gaur | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
IBM Security Guardium provides us great security for our data and has been used in our department for over a year. It helps us in compliance with our data security processes, and it has worked exceptionally well for us across all our environments. It is a very reliable and safe system to use.
  • All the monitoring activities can easily be automated.
  • All the suspicious activities are instantly flagged and an alert is generated.
  • We can select access rights for each individual.
  • It is not very user-friendly and a bit hard to navigate for some of the functionalities.
  • Reports and Dashboards aren't very much customizable.
  • Deployment took a really long time.
IBM Security Guardium is very well suited for big organizations, and it helps us maintain data security by minimizing the risks and threats. The alerts functionality is very flexible and successful, but we faced some issues while integrating with the SIEM platform. The data component management is very efficient.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
IBM Security Guardium is a great software being used in our organization. This is being used as a data activity monitoring tool and makes our life easier with an option to audit the activities of each individual user. Overall it is helping us to meet the compliance obligations to reduce the security threats.
  • Auditing of data can easily be centralized.
  • Automation of data monitoring reports.
  • It is scalable and effectively monitors the users for any suspicious activity.
  • It would have been great if this tool was more customizable.
  • The User Interface is a bit laggy and old fashioned.
  • It took ages for the proper deployment of this tool- could be made a bit easier and more efficient.
IBM Security Guardium is a bit of a pricey solution so it isn't a proper fit for small-mid level organizations. The alerts functionality is amazing and helps us a lot. Your critical data will stay secure with this tool because of its effective and easy administration.
Mansi Talwar | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We are widely using IBM Security Guardium throughout the organization since it is being ranked as the number 1 product in the data security tools. It provides security against the sensitive data of the clients and also secures the cloud-based platforms such as NoSQL, Azure databases, and Hadoop as well. It provides pre-defined templates of reports as well that can be used as per the needs.
  • Allows the users to select the access rights.
  • Allows all the activities to be tracked and flagged.
  • Monitoring is quite easy.
  • Ability to support multiple databases.
  • GUI can be tricky for beginners.
  • Administration is very difficult.
  • Error logs are sometimes very difficult to understand.
It is best suited for large-scale organizations that require additional security over their databases and cloud-based databases as well. It is the best tool that provides a lot of features. It helps to detect unusual activities and helps to set up real-time triggers for individual accounts as well. With this product, it has now become very easier to protect user information.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
IBM Security Guardium is an amazing tool that is currently being used in many departments of our organization to implement security policies. This is helping us a lot in securing our confidential data and minimizing security threats. It helps us in monitoring all the data activity to detect any kind of anomalies.
  • Prevention of any kind of data leak.
  • All the monitoring activities can be automated easily.
  • Easy integration with Hadoop and other databases.
  • GUI needs some improvement.
  • It is not highly customizable.
  • The visualization in the reports that are generated isn't much appealing.
IBM Security Guardium is very robust in terms of its functionalities and helps in accessing the real-time monitoring of our data. It has great automation power to maximize the data protection of your critical data. It is much more suitable for big organizations as compared to startups or small-level organizations.
Sebastian Zimmerman | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
With this tool we have implemented some additional security policies in the most vulnerable environments to prevent theft of confidential data, we establish authorizations for such access to information, we recognize user behavior in real-time to establish whether we are at risk, visibility of data is in full control with the centralization of audit data, accelerating all audits is a simple job and with resources available for all IT environments.
  • Centralization of audit data.
  • We can apply our security policies in real time.
  • I don't think it has negative features, although I think they should improve the response time of technical support, generally, the response time is long.
This software provides the security that every company seeks with the classification of confidential data from all areas, it can count the risks 100% without affecting performance. Access policies are another security feature that we know is necessary to create authorizations according to the position of each employee from different departments.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We have been using IBM Security Guardium for a year now to secure and protect our organizations' data. This data protection platform has helped us safeguard all the critical data and minimize risks and threats. IBM Security Guardium platform is easy to use and can be configured for even a single database. It has also helped us to monitor all the data activity and stay compliant!
  • Safeguards critical data from internal and external threats.
  • Automatically locates databases.
  • Tracks activity of data and end users.
  • Prevents data leaks.
  • User Interface can be improved.
  • Initial deployment is a bit tricky.
  • Reporting can be improved.
We were facing trouble managing our databases and file systems and locating the threats. It was difficult to keep track of the data activity. After implementing IBM Security Guardium data protection data management has become easy with the solutions helping us to monitor our data and set security policies. The additional benefit of using IBM Security Guardium is that it seamlessly adapts to the changes in the data environment that may impact the data in some way.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
IBM Security Guardium is currently being used in some of the departments in my organization. This tool helps us in getting more control over our data along with great security. This also helps us in detecting unusual activities in our company. It has a set of predefined policies that helps us a lot during the audit processes.
  • It provides data classification so the customers don't have to take care of the SQL traffic.
  • It is very easy to install on the existing databases and prevents the data losses.
  • This provides a great security to our sensitive data.
  • The User Interface needs some improvement.
  • Reporting feature is not very customizable.
  • The error messages are very difficult to interpret.
  • The deployment process could be bit lengthy.
IBM Security Guardium is a costly solution so it is not recommended for Small to mid-size organizations. The architecture is great which helps in the management of different components and makes the process very efficient. The alert/notifications flexibility is really successful and comes in very handy. Your sensitive data is very much secured because of this tool.
Sourabh Yaduvanshi | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Helping to mature IBM Security Guardium capability, onboarding databases, monitoring, and fine-tuning the policies, vulnerability assessment for the client, help to identify the crown jewels, identify where the sensitive data resides, installation of STAP and GIM, integration with 3 party SIEM tool and also with Qradar. Scan the databases and submits a report with complete finding based on the compliance template
  • End to End Discovery
  • Classification process and policy
  • Vulnerability assessment
  • once the report generated there should be remediation steps too
  • it has limited functionality on file level logging, like who access what
  • interface should be more user friendly
The client doesn't have any idea how many databases they have and where the sensitive data is located, so we use end to end discovery modules and identified all the credit card data wherever stored in which table or which column, also provide the complete report and its remediation steps with the help of end to end discovery report
Zinnur Dikici, Msc | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
We use it as the main solution for monitoring database activity in a bank. I have used IBM Guardium in companies that I worked with before. We use IBM Guardium for tracking database activities and also detection vulnerabilities such as SQLi at a database. The main requirements for use are to detect unusual activities in our company and meet industry regulations. We like the architecture of IBM Guardium.
  • Very stable product.
  • The architectural structure of the product provides very stable usage.
  • The product is not very user friendly.
  • Sometimes building queries and reports can be very complicated.
The product integration is very bad on the SIEM platform. We also use IBM Qradar (the same product). While alerts can be sent successfully with Syslog, admin activities cannot be sent successfully. According to us, alert/query flexibility is very successful. Also, data masking is better at alerts, queries or reports. Due to its architecture, the management of all components is very efficient. Database vulnerability scanning with the same agent is also excellent.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
Our whole company utilizes Security Guardium. Working at the homeless shelter, we manage numerous private cases and sensitive material on data basis. We must keep everything secure and private to ensure the integrity of the information. We must safeguard our critical data as much as possible and use IBM's services in order to do this.
  • Safeguard sensitive client information and data.
  • Prevents leaks from databases to ensure the most secure knowledge and details our company has.
  • Easy-to-use features and a user-friendly platform for all levels of expertise.
  • Needs a clearer user agreement and authorization policy.
  • Needs to be more clear and straightforward about how exactly it reduces data risks and keeps things secure.
  • I wish there were fewer steps to get started in the program, it is easier to use, but it needs to be quicker.
When dealing with client information, IBM Security Guardium is well suited. Also, when dealing with internal company secrets and data, IBM will make sure it is secure and safe. Scenarios where it is less appropriate could be for the general public and individuals rather than larger companies. I believe that this service is well intended and useful.
Adem Çeltik | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
ResellerIncentivized
IBM Security Guardium is a very useful tool to classify the sensitive data on your relational or non-relational databases, and monitor the activities of end users that can access the databases, like DBAs, Application Developers, etc. It supports almost every database and operating system platforms on our environment, so we can use it wherever our critical data is stored. IBM Security Guardium also helps organizations to be ready for audits like SOX, PCI, HIPAA, GDPR and etc. It has accelerators to be ready for almost every popular audits. The predefined policies and reports help us to pass the audits.

As everybody knows, GDPR will affect all the auditing mechanisms in the organizations. Every organizations store data that are subject to GDPR. IBM Security Guardium can easily find the tables,fields, views that stores the GDPR related data with its predefined classifications policies. It is free with base license. We are also using Guardium Vulnerability assessment tool to find the vulnerabilities about privilege, configuration and authentication on our databases.
  • Activity Monitoring : IBM Guardium monitors our databases without changing any configurations on the databases and servers. The STAP agent that push the SQL traffic from the database server to Guardium collectors is very robust, and it runs with minimum requirements.
  • You can define the activities to the finest detail in the policies to take actions. You can define the critical activities for your organizations and take the real time alerts for critical activities.
  • Classification : It has pre-defined Classification policies for GDPR to find critical data locations on our databases. Classification policy builder is easy to use if you want to write your own classification policy.
  • Reporting mechanism is very straight forward, to find logs. You can easily schedule them to distribute your colleagues to review them.
  • GUI was very complex older than v10, it becomes a little bit easy to use, but the user interface should be developed to become easier.
  • The error logs are hard to understand. If there is an issue about any function, the error messages cannot be understand easily.
IBM Security Guardium is an end-to-end DB security solution. You can detect critical data on your databases, and monitor your database activities , and you can block some critical sqls that the users should not be run.
IBM Security Guardium is not appropriate for monitoring applications traffic, because when you want to monitor application traffic, you cannot define the end user easily, and the SQL activities are difficult to interpret the jobs on the application.
Return to navigation